My Account Log in

1 option

Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / edited by Aditya Bagchi, Indrakshi Ray.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Bagchi, Aditya, editor.
Ray, Indrakshi, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 8303.
Security and Cryptology ; 8303
Language:
English
Subjects (All):
Computer security.
Data encryption (Computer science).
Computer networks.
Systems and Data Security.
Cryptology.
Computer Communication Networks.
Local Subjects:
Systems and Data Security.
Cryptology.
Computer Communication Networks.
Physical Description:
1 online resource (XVI, 404 pages) : 70 illustrations.
Edition:
First edition 2013.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
Contents:
Challenges and Opportunities for Security with Differential Privacy
An Encrypted In-Memory Column-Store: The Onion Selection Problem
Risk Aware Approach to Data Confidentiality in Cloud Computing
Jamming Resistant Schemes for Wireless Communication
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card
Signcryption from Randomness Recoverable PKE Revisited
Auctions with Rational Adversary
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services
Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management
Secure States versus Secure Executions - From Access Control to Flow Control
Monitoring for Slow Suspicious Activities Using a Target Centric Approach
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme
Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing
Web Services Based Attacks against Image CAPTCHAs
New Long-Term Glimpse of RC4 Stream Cipher
A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs
Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols
Information Theoretical Analysis of Side-Channel Attack
Efficient Multi-bit Image Steganography in Spatial Domain
Evolutionary Multibit Grouping Steganographic Algorithm
Let the Right One in: Discovering and Mitigating Permission Gaps
A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption
Error Correction of Partially Exposed RSA Private Keys from MSB Side
Efficient Enforcement of Privacy for Moving Object Trajectories
An Administrative Model for Spatio-Temporal Role Based Access Control
A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Other Format:
Printed edition:
ISBN:
978-3-642-45204-8
9783642452048
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account